A global internet puzzle that requires advanced computer skills to solve has reopened online.
It is the third year running that the mysterious Cicada 3301 has appeared, with no clues as to who is behind the puzzle.
Some believe it is a recruitment process for a government spy agency, while others believe it could be the work of a bank.
The puzzle takes people on a treasure trail around the so-called dark net.
This year’s competition was announced via a Twitter account to which was attached an image file with the following message: “Hello. Epiphany is upon you. Your pilgrimage has begun. Enlightenment awaits. Good luck. 3301.”
Thousands of fans have been drawn into the competition and have eagerly awaited its relaunch.
This year’s iteration already appears to be fiendishly difficult, requiring understanding of OutGuess, a complex steganography tool.
Steganography hides data inside images, and is often used for nefarious purposes by terrorists and paedophiles.Anglo-Saxon runes
Computer scientist Prof Alan Woodward is one of those who has previously taken part in the competition.
“The puzzles are very complicated and require knowledge of steganography, cryptography as well as obscure existential texts,” he told the BBC.
Previous competitions have taken people on both a mental and physical journey, encompassing cyber-punk literature, Anglo-Saxon runes and the work of occultist and magician Aleister Crowley.
Last year, part of the treasure trail also required people to travel to physical locations to decode QR codes posted on telegraph poles dotted around the US.
Now that the competition is widely known about there has been a spate of fakes but for those with the necessary knowledge it is easy to spot the real thing.
“The group uses a PGP signature and put up a key signed with this,” explained Prof Woodward.
Speculation about who is behind the puzzle has been gaining momentum as the competition attracts more publicity.
“It could be a criminal organisation looking for recruits or it could be a start-up looking to set up a new crypto-currency, possibly even a bank,” said Prof Woodward.
“Lots of people think it could be a government agency and that looks reasonably likely as whoever is being recruited isn’t telling anybody afterwards,” he added.
The Latest on: Steganography
via Google News
The Latest on: Steganography
- Can APIs be copyrighted?on March 23, 2020 at 3:04 am
Peter Wayner is contributing editor at InfoWorld and the author of more than 16 books on diverse topics, including open source software, autonomous cars, privacy-enhanced computation, digital ...
- Cheating AI Caught Hiding Data Using Steganographyon March 19, 2020 at 5:00 pm
AI today is like a super fast kid going through school whose teachers need to be smarter than if not as quick. In an astonishing turn of events, a (satelite)image-to-(map)image conversion ...
- Beginner’s Guide to CTFson March 19, 2020 at 1:15 pm
It is also one of the few places where you can find forensics and steganography challenges if that’s what you are into. Finally, if you want to participate in a live CTF or an Attack-and Defense ...
- Russians Among Us by Gordon Corera review – spies in plain sighton March 17, 2020 at 12:00 am
The BBC security editor’s account of Russian spying methods in the US is engrossing ...
- 10 things you forgot to do to your codeon March 6, 2020 at 4:52 pm
It’s just one continuous cycle of improvement and deployment. Peter Wayner is contributing editor at InfoWorld and the author of more than 16 books on diverse topics, including open source software, ...
- Hide Data in Images — Encrypted Steganography With Flutteron February 27, 2020 at 10:47 am
Photo by Kristina Flour on Unsplash. Steganography is the practice of concealing messages (e.g. text, raw bytes, or images) within other types of media (e.g. images, videos, or files). For example ...
- BlackBerry report says data losses increasing due to cloud misconfigurationon February 19, 2020 at 9:54 am
“Their focus on improving encryption routines and concealing malicious payloads through steganography [concealing malware within files or images] raised the bar for security researchers and thre ...
- First use of steganographyon June 8, 2019 at 10:45 pm
Dating back to the 5th century BC, steganography is one of the oldest methods of concealing secret information. According to the classical author Herodotus, it was first used by the tyrant Histiaeus, ...
- Introduction to Steganographyon March 19, 2019 at 5:10 pm
Security is a big issue in today's world. The world today has completely or mostly started working on computers. Computer stores data which can be vital information in the form of electronic files.
- social steganographyon February 26, 2019 at 3:23 am
See steganography. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.
via Bing News